Open Access Open Access  Restricted Access Subscription or Fee Access


Harshika Mathur, Pradeep Kumar Sharma


The proposed work takes the concept of the fingerprint and the photo for the registration phase and generates the password using the MD5 hash algorithm with the variation done using the length of the user name and length of the email id. When sending the data the joint key is generated using SHA algorithm on the private keys or passwords of the sender and receiver.

Full Text:



Nan Li “Research on Diffie-Hellman Key Exchange Protocol” 2010 2nd International Conference on Computer Engineering and Technology, Volume 4, DOI- 10.1109/ICCET.2010.5485276, 2010, IEEE, Chengdu, China.

Manoj Ranjan Mishra, Jayaprakash Kar “A Study On Diffie-Hellman Key Exchange Protocols” International Journal of Pure and Applied Mathematics,Vol 114(2), ISSN: 1314-3395 (on-line version), doi: 10.12732/ijpam.v114i2.2, 2017.

M.S.Durairajan, Dr.R. Saravanan” Biometrics Based Key Generation using Diffie Hellman Key Exchange for Enhanced Security Mechanism” International Journal of ChemTech Research CODEN (USA): IJCRGG ISSN : 0974-4290, Vol.6, No.9, pp 4359-4365, September 2014.

Asmin Bhandari, Moshiur Bhuiyan, P. W. C. Prasad” Enhancement of MD5 Algorithm for Secured Web Development” Journal Of Software Volume 12, Number 4, doi: 10.17706/jsw.12.4.240-252, PP 240-252, April 2017.

Surbhi Aggarwal, Neha Goyal, Kirti Aggarwal” A review of comparative Study of MD5 and SHA Security Algorithm”, International Journal of Computer Applications (0975 – 8887) Volume 104 – No.14, October 2014.

Oyetola Oluwadamilola K., Okubanjo Ayodeji A., Osifeko Martins O.” An Improved Authentication System Using Hybrid of Biometrics and Cryptography” 2017,3rd International Conference on Electro-Technology for National Development (NIGERCON), DOI: 10.1109/NIGERCON.2017.8281915 , Owerri, Nigeria , INSPEC Accession Number: 17575798, Nov 2017.

Anil K. Jain, Arun Ross, and Sharath Pankanti “ Biometrics: A Tool for Information Security” IEEE Transactions On Information Forensics And Security, Vol. 1, NO. 2, PP-125-143, DOI: 10.1109/TIFS.2006.873653, INSPEC Accession Number: 8928545 ,JUNE 2006

A. Hadid, “Face biometrics under spoofing attacks: Vulnerabilities, countermeasures, open issues, and research directions,” IEEE Comput.Soc. Conf. Comput. Vis. Pattern Recognit. Work., no. Cmv, pp. 113–118, 2014,IEEE, Columbus, OH, USA.

S. Barman, D. Samanta, and S. Chattopadhyay “Fingerprint-based crypto-biometric system for network security,” EURASIP J. Inf. Secur., vol.2015, no. 1, p. 3, DOI:, 2015, Springer.

Leila Zoubida, Réda Adjoudj “Integrating Face and the Both Irises for Personal Authentication” I.J. Intelligent Systems and Applications, V 3(3), P:8-17, March 2017, DOI: 10.5815/ijisa.2017, feb 2017.



  • There are currently no refbacks.